Skip to main content

A Secure Energy-Efficient Routing Protocol for WSN

  • Conference paper
Parallel and Distributed Processing and Applications (ISPA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4742))

Abstract

The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sink-rooted tree in the network which is used for secure data transmissions from the source sensors to the base station. We mainly focus on ensuring authenticity and confidentiality of the sensor reports by adopting one-way hash chain and pre-loaded shared secret keys. To achieve data freshness, there is an optional key refreshment mechanism in our protocol. Along with the detailed description of our protocol, we present an analysis and performance evaluation of our proposal.

This work was supported by the MIC and ITRC. Dr. C.S. Hong is the corresponding author.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Net-works: A Survey. Computer Networks 38, 393–422 (2002)

    Article  Google Scholar 

  2. Dai, S., Jing, X., Li, L.: Research and analysis on routing protocols for wireless sensor networks. In: Proc. of Int. Conf. on Comm. Circuits and Systems, vol. 1, pp. 407–411 (2005)

    Google Scholar 

  3. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, 293–315 (September 2003)

    Google Scholar 

  4. Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proc. of the 8th IEEE ICACT 2006, Korea, vol. II, pp. 1043–1048 (2006)

    Google Scholar 

  5. Çam, H., Özdemir, S., Muthuavinashiappan, D., Nair, P.: Energy Efficient Security Protocol for Wireless Sensor Networks. Proc. of IEEE VTC 5, 2981–2984 (2003)

    Google Scholar 

  6. Çam, H., Özdemir, S., Nair, P., Muthuavinashiappan, D., Sanli, H.O.: Energy-efficient secure pattern based data aggregation for wireless sensor networks. Computer Communications 29(4), 446–455 (2006)

    Article  Google Scholar 

  7. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE Jrnl. on Selected Areas in Communications 23(4), 839–850 (2005)

    Article  Google Scholar 

  8. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of S&P, pp. 259–271 (2004)

    Google Scholar 

  9. Lee, H.Y., Cho, T.H.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds.) ICDCIT 2006. LNCS, vol. 4317, pp. 116–127. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-Efficient Communication Protocol for Wireless Microsensor Networks. In: Proc. of HICSS, pp. 3005–3014 (2000)

    Google Scholar 

  11. Azzedine, B., Xiuzhen, C., Joseph, L.: Energy-aware data-centric routing in microsensor networks. In: Proceedings of the 8th MSWiM 03, San Diego, pp. 42–49 (2003)

    Google Scholar 

  12. Hyunh, T.T., Hong, C.S.: An Energy*Delay Efficient Multi-Hop Routing Scheme for Wireless Sensor Networks. IEICE Trans. on Info. & Sys. E89-D(5), 1654–1661 (2006)

    Article  Google Scholar 

  13. Yin, C., Huang, S., Su, P., Gao, C.: Secure routing for large-scale wireless sensor networks. In: Proceedings of IEEE ICCT 2003, 9-11 April 2003, vol. 2, pp. 1282–1286. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  14. Xbow Sensor Networks, Available at: http://www.xbow.com/

  15. Hass, Z.J.: Design methodologies for adaptive and multimedia networks. IEEE Communications Magazine 39(11), 106–107 (2001)

    Article  Google Scholar 

  16. Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions in Wireless Communications 1(4), 660–670 (2002)

    Article  Google Scholar 

  17. Lamport, L.: Constructing digital signatures from one-way function. Technical report SRI-CSL-98, SRI International (October 1979)

    Google Scholar 

  18. The Network Simulator - ns-2, http://www.isi.edu/nsnam/ns/

  19. Coppersmith, D., Jakobsson, M.: Almost Optimal Hash Sequence Traversal. In: 6th International Financial Cryptography 2002, Bermuda (March2002)

    Google Scholar 

  20. Jakobsson, M.: Fractal hash sequence representation and traversal. In: 2002 IEEE International Symposium on Information Theory, Switzerland. IEEE Computer Society Press, Los Alamitos (2002)

    Google Scholar 

  21. Sella, Y.: On the computation-storage trade-offs of hash chain traversal. In: The 7th International Financial Cryptography Conference, Guadeloupe (January 2003)

    Google Scholar 

  22. Mamun-Or-Rashid, Md., Alam, M.M., Hong, C.S.: Energy Efficient Routing for Highly Dense Sensor Networks Based on Residual Energy and Distance. In: Proc. of IEEE ICNEWS, Dhaka, Bangladesh, pp. 52–56 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ivan Stojmenovic Ruppa K. Thulasiram Laurence T. Yang Weijia Jia Minyi Guo Rodrigo Fernandes de Mello

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pathan, AS.K., Hong, C.S. (2007). A Secure Energy-Efficient Routing Protocol for WSN. In: Stojmenovic, I., Thulasiram, R.K., Yang, L.T., Jia, W., Guo, M., de Mello, R.F. (eds) Parallel and Distributed Processing and Applications. ISPA 2007. Lecture Notes in Computer Science, vol 4742. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74742-0_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74742-0_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74741-3

  • Online ISBN: 978-3-540-74742-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics